*******************************************************************
CALL FOR PARTICIPATION
Including Technical Program
SecureComm 2006
Second International Conference on Security and Privacy for
Communication Networks
Radisson Plaza Lord Baltimore Hotel
Baltimore, MD, USA, Aug. 28 - Sep. 1, 2006
URL: http://www.securecomm.org
CO-SPONSORED BY:
IEEE Communications Society (www.comsoc.org)
CreateNet (www.create-net.it)
In Cooperation with ACM SIGSAC
Early Registration Ends August 1, 2006
*******************************************************************
The scope of Securecomm 2006 has been broadened since the inaugural
2005 event. Topics of interest encompass research advances in ALL
areas of secure communications and networking.
Securecomm aims to bring together security and privacy experts in
academia, industry and government as well as practitioners, standards
developers and policy makers. Securecomm also serves as a venue for
learning about state-of-the-art in security and privacy
research. Presentations reporting on cutting-edge research results are
supplemented by panels on controversial issues and invited talks on
timely and important topics.
For information regarding the conference, please visit
http://www.securecomm.org or contact one of the Chairs below.
*******************************************************************
TECHNICAL PROGRAM
TUESDAY, August 29:
08:30 - 09:00 Introduction and Welcome
09:00 - 10:00 Keynote Talk, Dr. Charles Palmer, IBM;
Title: "An(other) Inconvenient Truth"
10.15 - 12:00 Session 1: INTRUSION DETECTION and DoS
* A Flexible Approach to Intrusion Alert Anonymization and
Correlation
Dingbang Xu, Peng Ning
* An Intelligent Infrastructure Strategy to Improving the
Performance and Detection Capability of Intrusion Detection
Systems
Emmanuel Hooper
* Framework for Identifying Compromised Nodes in Sensor Networks
Qing Zhang, Ting Yu, Peng Ning
* Denial of Service Attacks and Defenses in Decentralized Trust
Management
Ninghui Li, Jiangtao Li, XiaoFeng Wang, Ting Yu
01:30 - 03:15 Session 2: WORMS and VIRUSES
* An Architecture for an Email Worm Prevention System
Mohamed Taibah, Ehab Al-Shaer
* Distributed Stealthy Coordination Mechanism for Worm
Synchronization
Gaurav Kataria, Gaurav Anand, Rudolph Araujo, Ramayya
Krishnan,
Adrian Perrig
* Effective Detection of Active Worms with Varying Scan Rate
Wei Yu, Xun Wang, Dong Xuan, David Lee
* On Mobile Viruses Exploiting Messaging and Bluetooth Services
Abhijit Bose, Kang G. Shin
03:30 - 05:15 Session 3: AD HOC NETWORKS:
* Discount Anonymous On Demand Routing for Mobile Ad hoc Networks
Liu Yang, Markus Jakobsson, Susanne Wetzel
* In-Band Wormholes and Countermeasures in OLSR Networks
Peter Kruus, Dan Sterne, Richard Gopaul, Michael Heyman, Brian
Rivera, Peter Budulas, Brian Luu, Tommy Johnson, Natalie
Ivanic,
Geoff Lawler
* Detecting the Sybil Attack in Ad hoc Networks
Clay Shields, Chris Piro, Brian N. Levine
* Enhancing Benign User Cooperation in the Presence of Malicious
Adversaries in Ad Hoc Networks
George Theodorakopoulos, John Baras
07:00 - 09:00: Demo and Poster Session:
DEMOS:
Mobipot, Takehiro Takahashi
Policy Machine Demonstration, David Ferraiolo
Bootstrapping for MIPv6, Vishnu Ram
Electromagnetic Signatures of WLAN Cards: Identification of Cards in
the Presence of an Interferer, Kate Remley and Bob Johnk
PSELS: Practical Secure Email Lists Services, Himanshu Khurana, Jin
Heo and Meenal Pant
Pvault: A Client Server System Providing Mobile Access to Personal Data,
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian
POSTERS:
Collaborative Location Certification for Sensor Networks, Sol Lederer
Physical Layer Information Assurance Enhancement Using Phased Arrays,
Joe Carey
Enhancing Privacy Preservation of Anonymous Location Sampling
Techniques in Traffic Monitoring Systems, Baik Hoh, Marco Gruteser
Security in Mobile Ad hoc Networks, G.V.S.Raju
A Centralized Group Rekeying Scheme for Secure Group Communication in
Wireless Sensor Networks, Yong Wang and Byrav Ramamurthy
---------------- DAY 2 ---------------------
WEDNESDAY, August 30:
09:00 - 10:00: Invited Talk, Mr. Brian Snow, Title: "We Need Assurance"
10.15 - 12:00 Session 4: APPLIED CRYPTO + CODING
* An Identity-based Ring Signature Scheme with Enhanced Privacy
Chandana Gamage, Ben Gras, Andrew Tanenbaum, Bruno Crispo
* Implementation and Performance Evaluation of EAP-TLS-KS
Jared Cordasco, Ulrike Meyer, and Susanne Wetzel
* Provably Secure Ubiquitous Systems: Universally Composable RFID
Authentication Protocols
Mike Burmester, Tri van Le, Breno de Medeiros
* Packet coding for strong anonymity in ad hoc networks
Imad Aad, Claude Castelluccia, Jean-Pierre Hubaux
01:30 - 03:15 Session 5: MALICIOUS TRAFFIC
* Protecting Against Distributed Denial of Service (DDoS) Attacks
Using Distributed Filtering
Jonathan Trostle
* A Double Horizon Defense Design for Robust Regulation of
Malicious Traffic
Ying Xu, Roch Guerin
* TOPO: A Topology-aware Single Packet Attack Traceback Scheme
Linfeng Zhang, Yong Guan
* On filtering of DDoS attacks based on source address prefixes
Cristian Estan, Gary Pack, Jaeyoung Yoon, Eli Collins
03:30 - 05:15 Session 6: Network Security I:
* Preventing Cross Site Request Forgery Attacks
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
* DaTA -- Data Transparent Authentication without Communication
Overhead
Songqing Chen, Shiping Chen, Xinyuan Wang, Sushil Jajodia
* Attacking Mobile Phones by Exploiting Emerging Vulnerabilities
in Cellular Data Services
Hao Chen, Denys Ma, Radmilo Racic
* MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop
Wireless Networks
Issa Khalil, Saurabh Bagchi, Ness Shroff
06:30 - 08:00 Conference Reception
---------------- DAY 3 ---------------------
THURSDAY, August 31:
08:30 - 10:00 PANEL
TITLE: Achieving Practical Private Information Retrieval
CHAIR: Radu Sion (SUNY, Stony Brook)
PANELISTS: Aggelos Kiayias (Univ. of Connecticut), Giovanni Di
Crescenzo (Telcordia), William Gasarch (Univ. of Maryland)
and Moti
Yung (RSA, Inc. and Columbia Univ.)
10:15 - 12:00 Session 7: Network Security II:
* Leveraging IPsec for Mandatory Access Control Across Systems
Trent Jaeger, Dave King, Kevin Butler, Serge Hallyn, Joy
Latten, Xiaolan Zhang
* Enabling Confidentiality in Content-Based Publish/Subscribe
Infrastructures
Costin Raiciu, David Rosenblum
* Non-Invasive Methods for Host Certification
Patrick Traynor, Michael Chien, Scott Weaver, Boniface
Hicks, Patrick McDaniel
* Secure Real-time User Preference Collection for Broadcast
Scheduling
Xuhua Ding, Baihua Zheng, Shuhong Wang
01:00 - 02:45 Session 8: SENSOR and CELLULAR NETWORKS:
* Message Dropping Attacks in Overlay Networks: Attack Detection
and Attacker Identification
Liang Xie, Sencun Zhu
* How to Design Connected Sensor Networks that are Provably Secure
Roberto Di Pietro, Luigi Mancini, Alessandro Mei, Jaikumar
Radhakrishnan, Alessandro Panconesi
* Distributed Authentication of Program Integrity Verification in
Wireless Sensor Networks
Katharine Chang, Kang G. Shin
* Towards More Efficient Distance Bounding Protocols for Use in
Sensor Networks
Catherine Meadows, Paul Syverson, LiWu Chang
END OF CONFERENCE
Workshops will be held on Monday, August 28 and September 1 (Friday)
*******************************************************************
CONFERENCE ORGANIZING COMMITTEE
General Co-Chairs
-----------------
Mukesh Singhal, University of Kentucky, singhal@cs.uky.edu
John Baras, University of Maryland, College Park, baras@isr.umd.edu
Technical Program Co-Chairs
---------------------------
Steve Kent, BBN, kent@bbn.com
Gene Tsudik, UC Irvine, gts@ics.uci.edu
Workshops Chair
---------------
G. Manimaran, Iowa State University, gmani@iastate.edu
Panels Co-Chairs
----------------
Bruno Crispo, Vrije Universiteit, Netherlands, crispo@few.vu.nl
Avishai Wool, Technion, Israel, yash@eng.tau.ac.il
Research Demos/Exhibits Chair
-----------------------------
Tom Karygiannis, NIST, karygiannis@nist.gov
Sponsorships Chair
------------------
Byrav Ramamurthy, University of Nebraska, Lincoln, byrav@cse.unl.edu
Publicity Co-Chairs
-------------------
Peng Liu, Penn State University, pliu@ist.psu.edu
Cristina Nita-Rotaru, Purdue University, crisn@cs.purdue.edu
Publication Chair
-----------------
Farooq Anjum, Telcordia Technologies, fanjum@telcordia.com
Steering Committee:
-------------------
Imrich Chlamtac (Chair), Create-Net
Krishna M. Sivalingam (Co-Chair), University of Maryland, Baltimore
County
Gene Tsudik, University of California, Irvine
Brian Bigalke, (Staff Liaison, IEEE Communications Society)
TECHNICAL PROGRAM COMMITTEE
---------------------------
N. Asokan Nokia Research
Giuseppe Ateniese Johns Hopkins University
Tuomas Aura Microsoft Research
Dirk Balfanz PARC
Bharat Bhargava Purdue
Matt Bishop University of California, Davis
Levente Buttyan Budapest University of Technology
Srdjan Capkun Technical University of Denmark
Claude Castelluccia Inria Rhone-Alpes
Tom Chen Southern Methodist University
Bruno Crispo Vrije Universitet
Breno de Medeiros University of Central Florida
Robert Deng Singapore Management University
Xuhua Ding Singapore Management University
Glenn Durfee PARC
Bao Feng Institute for Infocomm Research
Dieter Gollmann Technical University of Hamburg-Harb
Richard Han University of Colorado at Boulder
Tom Karygiannis NIST
Yongdae Kim University of Minnessota
Christopher Kruegel Technical University of Vienna
Kwok-Yan Lam Tsinghua University
Brian LaMacchia Microsoft
Carl Landwehr University of Maryland
Wenke Lee Georgia Tech
Albert Levi Sabanci University,
Ninghui Li Purdue
Peng Liu Pennsylvania State University
Luigi Mancini Unversity of Rome - La Sapienza
Fabio Massacci University of Trento
Ludovic Me' Supelec
Pietro Michiardi Eurecom Institute
Refik Molva Eurecom Institute
Mats Naslund Ericsson Research
Pekka Nikander Ericsson Nomadiclab
Cristina Nita-Rotaru Purdue
Radha Poovendran University of Washington
Byrav Ramamurthy University of Nebraska-Lincoln
Michael Roe Microsoft Research
Sanjeev Setia George Mason University
Cliff Wang Army Research Laboratory
Helen Wang Microsoft Research
Ron Watro BBN
Dirk Westhoff NEC Research
Susanne Wetzel Stevens Institute of Technology
Avishai Wool Tel Aviv University
Shouhuai Xu University of Texas, San Antonio
Xiaowei Yang University of California, Irvine
Bulent Yener Rensselauer Polytechnic Institute
Jeong Hyun Yi Samsung Advanced Institute of Technology
Jianying Zhou Institute for Infocomm Research
Alf Zugenmaier DoCoMo Labs
************************************************